2014-11-15 19:15:11 +01:00
|
|
|
/*******************************************************************************
|
|
|
|
|
2016-03-22 15:19:41 +01:00
|
|
|
uBlock Origin - a browser extension to block requests.
|
|
|
|
Copyright (C) 2014-2016 The uBlock Origin authors
|
2014-11-15 19:15:11 +01:00
|
|
|
|
|
|
|
This program is free software: you can redistribute it and/or modify
|
|
|
|
it under the terms of the GNU General Public License as published by
|
|
|
|
the Free Software Foundation, either version 3 of the License, or
|
|
|
|
(at your option) any later version.
|
|
|
|
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
GNU General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
|
|
along with this program. If not, see {http://www.gnu.org/licenses/}.
|
|
|
|
|
|
|
|
Home: https://github.com/gorhill/uBlock
|
|
|
|
*/
|
|
|
|
|
2014-11-16 14:09:28 +01:00
|
|
|
// For background page
|
2014-11-15 19:15:11 +01:00
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
|
|
|
|
(function() {
|
|
|
|
|
|
|
|
'use strict';
|
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
|
2015-01-14 23:45:55 +01:00
|
|
|
var vAPI = self.vAPI = self.vAPI || {};
|
2014-11-15 19:15:11 +01:00
|
|
|
|
|
|
|
var chrome = self.chrome;
|
2014-12-01 17:25:33 +01:00
|
|
|
var manifest = chrome.runtime.getManifest();
|
2014-11-15 19:15:11 +01:00
|
|
|
|
|
|
|
vAPI.chrome = true;
|
2016-08-31 01:57:25 +02:00
|
|
|
vAPI.cantWebsocket = true;
|
2014-11-15 19:15:11 +01:00
|
|
|
|
2015-01-21 01:39:13 +01:00
|
|
|
var noopFunc = function(){};
|
|
|
|
|
2014-11-15 19:15:11 +01:00
|
|
|
/******************************************************************************/
|
|
|
|
|
2014-12-01 17:25:33 +01:00
|
|
|
vAPI.app = {
|
|
|
|
name: manifest.name,
|
|
|
|
version: manifest.version
|
|
|
|
};
|
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
|
2014-12-02 17:02:17 +01:00
|
|
|
vAPI.app.restart = function() {
|
|
|
|
chrome.runtime.reload();
|
|
|
|
};
|
|
|
|
|
2015-08-11 21:29:14 +02:00
|
|
|
/******************************************************************************/
|
2014-12-02 17:02:17 +01:00
|
|
|
/******************************************************************************/
|
|
|
|
|
2015-03-27 18:00:55 +01:00
|
|
|
// chrome.storage.local.get(null, function(bin){ console.debug('%o', bin); });
|
|
|
|
|
2014-11-15 19:15:11 +01:00
|
|
|
vAPI.storage = chrome.storage.local;
|
2016-10-28 14:40:38 +02:00
|
|
|
vAPI.cacheStorage = chrome.storage.local;
|
2014-11-15 19:15:11 +01:00
|
|
|
|
2015-08-11 21:29:14 +02:00
|
|
|
/******************************************************************************/
|
2014-11-15 19:15:11 +01:00
|
|
|
/******************************************************************************/
|
|
|
|
|
2015-06-01 21:03:22 +02:00
|
|
|
// https://github.com/gorhill/uMatrix/issues/234
|
|
|
|
// https://developer.chrome.com/extensions/privacy#property-network
|
|
|
|
|
2015-08-14 01:42:30 +02:00
|
|
|
// 2015-08-12: Wrapped Chrome API in try-catch statements. I had a fluke
|
2015-08-16 14:17:01 +02:00
|
|
|
// event in which it appeared Chrome 46 decided to restart uBlock (for
|
2015-08-14 01:42:30 +02:00
|
|
|
// unknown reasons) and again for unknown reasons the browser acted as if
|
|
|
|
// uBlock did not declare the `privacy` permission in its manifest, putting
|
2015-08-16 14:17:01 +02:00
|
|
|
// uBlock in a bad, non-functional state -- because call to `chrome.privacy`
|
2015-08-14 01:42:30 +02:00
|
|
|
// API threw an exception.
|
|
|
|
|
2016-10-05 12:52:43 +02:00
|
|
|
// https://github.com/gorhill/uBlock/issues/2048
|
|
|
|
// Do not mess up with existing settings if not assigning them stricter
|
|
|
|
// values.
|
|
|
|
|
2016-10-19 16:20:26 +02:00
|
|
|
vAPI.browserSettings = (function() {
|
|
|
|
// Not all platforms support `chrome.privacy`.
|
|
|
|
if ( chrome.privacy instanceof Object === false ) {
|
|
|
|
return;
|
|
|
|
}
|
2015-12-31 15:24:55 +01:00
|
|
|
|
2016-10-19 16:20:26 +02:00
|
|
|
return {
|
|
|
|
webRTCSupported: undefined,
|
2016-08-31 23:28:10 +02:00
|
|
|
|
2016-10-19 16:20:26 +02:00
|
|
|
// https://github.com/gorhill/uBlock/issues/875
|
|
|
|
// Must not leave `lastError` unchecked.
|
|
|
|
noopCallback: function() {
|
|
|
|
void chrome.runtime.lastError;
|
|
|
|
},
|
2015-12-31 15:24:55 +01:00
|
|
|
|
2016-10-19 16:20:26 +02:00
|
|
|
// Calling with `true` means IP address leak is not prevented.
|
2015-12-31 15:24:55 +01:00
|
|
|
// https://github.com/gorhill/uBlock/issues/533
|
2016-10-19 16:20:26 +02:00
|
|
|
// We must first check wether this Chromium-based browser was compiled
|
|
|
|
// with WebRTC support. To do this, we use an iframe, this way the
|
|
|
|
// empty RTCPeerConnection object we create to test for support will
|
|
|
|
// be properly garbage collected. This prevents issues such as
|
|
|
|
// a computer unable to enter into sleep mode, as reported in the
|
|
|
|
// Chrome store:
|
|
|
|
// https://github.com/gorhill/uBlock/issues/533#issuecomment-167931681
|
|
|
|
setWebrtcIPAddress: function(setting) {
|
|
|
|
// We don't know yet whether this browser supports WebRTC: find out.
|
|
|
|
if ( this.webRTCSupported === undefined ) {
|
|
|
|
this.webRTCSupported = { setting: setting };
|
|
|
|
var iframe = document.createElement('iframe');
|
|
|
|
var me = this;
|
|
|
|
var messageHandler = function(ev) {
|
|
|
|
if ( ev.origin !== self.location.origin ) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
window.removeEventListener('message', messageHandler);
|
|
|
|
var setting = me.webRTCSupported.setting;
|
|
|
|
me.webRTCSupported = ev.data === 'webRTCSupported';
|
|
|
|
me.setWebrtcIPAddress(setting);
|
|
|
|
iframe.parentNode.removeChild(iframe);
|
|
|
|
iframe = null;
|
|
|
|
};
|
|
|
|
window.addEventListener('message', messageHandler);
|
|
|
|
iframe.src = 'is-webrtc-supported.html';
|
|
|
|
document.body.appendChild(iframe);
|
|
|
|
return;
|
2016-08-31 23:28:10 +02:00
|
|
|
}
|
2015-12-31 15:24:55 +01:00
|
|
|
|
2016-10-19 16:20:26 +02:00
|
|
|
// We are waiting for a response from our iframe. This makes the code
|
|
|
|
// safe to re-entrancy.
|
|
|
|
if ( typeof this.webRTCSupported === 'object' ) {
|
|
|
|
this.webRTCSupported.setting = setting;
|
|
|
|
return;
|
2016-08-31 23:28:10 +02:00
|
|
|
}
|
2015-12-31 15:24:55 +01:00
|
|
|
|
2016-10-19 16:20:26 +02:00
|
|
|
// https://github.com/gorhill/uBlock/issues/533
|
|
|
|
// WebRTC not supported: `webRTCMultipleRoutesEnabled` can NOT be
|
|
|
|
// safely accessed. Accessing the property will cause full browser
|
|
|
|
// crash.
|
|
|
|
if ( this.webRTCSupported !== true ) {
|
|
|
|
return;
|
2015-06-01 21:03:22 +02:00
|
|
|
}
|
2016-10-19 16:20:26 +02:00
|
|
|
|
|
|
|
var cp = chrome.privacy,
|
|
|
|
cpn = cp.network;
|
|
|
|
|
|
|
|
// Older version of Chromium do not support this setting, and is
|
|
|
|
// marked as "deprecated" since Chromium 48.
|
|
|
|
if ( typeof cpn.webRTCMultipleRoutesEnabled === 'object' ) {
|
2015-08-14 01:42:30 +02:00
|
|
|
try {
|
2016-10-19 16:20:26 +02:00
|
|
|
if ( setting ) {
|
|
|
|
cpn.webRTCMultipleRoutesEnabled.clear({
|
2016-10-05 12:52:43 +02:00
|
|
|
scope: 'regular'
|
|
|
|
}, this.noopCallback);
|
|
|
|
} else {
|
2016-10-19 16:20:26 +02:00
|
|
|
cpn.webRTCMultipleRoutesEnabled.set({
|
2016-10-05 12:52:43 +02:00
|
|
|
value: false,
|
|
|
|
scope: 'regular'
|
|
|
|
}, this.noopCallback);
|
|
|
|
}
|
2015-08-14 01:42:30 +02:00
|
|
|
} catch(ex) {
|
|
|
|
console.error(ex);
|
|
|
|
}
|
2016-10-19 16:20:26 +02:00
|
|
|
}
|
2015-06-01 21:03:22 +02:00
|
|
|
|
2016-10-19 16:20:26 +02:00
|
|
|
// This setting became available in Chromium 48.
|
|
|
|
if ( typeof cpn.webRTCIPHandlingPolicy === 'object' ) {
|
2015-08-14 01:42:30 +02:00
|
|
|
try {
|
2016-10-19 16:20:26 +02:00
|
|
|
if ( setting ) {
|
|
|
|
cpn.webRTCIPHandlingPolicy.clear({
|
2016-10-05 12:52:43 +02:00
|
|
|
scope: 'regular'
|
|
|
|
}, this.noopCallback);
|
|
|
|
} else {
|
2016-10-19 16:20:26 +02:00
|
|
|
// Respect current stricter setting if any.
|
|
|
|
cpn.webRTCIPHandlingPolicy.get({}, function(details) {
|
|
|
|
var value = details.value === 'disable_non_proxied_udp' ?
|
|
|
|
'disable_non_proxied_udp' :
|
|
|
|
'default_public_interface_only';
|
|
|
|
cpn.webRTCIPHandlingPolicy.set({
|
|
|
|
value: value,
|
|
|
|
scope: 'regular'
|
|
|
|
}, this.noopCallback);
|
|
|
|
}.bind(this));
|
2016-10-05 12:52:43 +02:00
|
|
|
}
|
2015-08-14 01:42:30 +02:00
|
|
|
} catch(ex) {
|
|
|
|
console.error(ex);
|
|
|
|
}
|
2016-10-19 16:20:26 +02:00
|
|
|
}
|
|
|
|
},
|
2015-06-02 14:26:35 +02:00
|
|
|
|
2016-10-19 16:20:26 +02:00
|
|
|
set: function(details) {
|
|
|
|
for ( var setting in details ) {
|
|
|
|
if ( details.hasOwnProperty(setting) === false ) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
switch ( setting ) {
|
|
|
|
case 'prefetching':
|
|
|
|
try {
|
|
|
|
if ( !!details[setting] ) {
|
|
|
|
chrome.privacy.network.networkPredictionEnabled.clear({
|
|
|
|
scope: 'regular'
|
|
|
|
}, this.noopCallback);
|
|
|
|
} else {
|
|
|
|
chrome.privacy.network.networkPredictionEnabled.set({
|
|
|
|
value: false,
|
|
|
|
scope: 'regular'
|
|
|
|
}, this.noopCallback);
|
|
|
|
}
|
|
|
|
} catch(ex) {
|
|
|
|
console.error(ex);
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
case 'hyperlinkAuditing':
|
|
|
|
try {
|
|
|
|
if ( !!details[setting] ) {
|
|
|
|
chrome.privacy.websites.hyperlinkAuditingEnabled.clear({
|
|
|
|
scope: 'regular'
|
|
|
|
}, this.noopCallback);
|
|
|
|
} else {
|
|
|
|
chrome.privacy.websites.hyperlinkAuditingEnabled.set({
|
|
|
|
value: false,
|
|
|
|
scope: 'regular'
|
|
|
|
}, this.noopCallback);
|
|
|
|
}
|
|
|
|
} catch(ex) {
|
|
|
|
console.error(ex);
|
|
|
|
}
|
|
|
|
break;
|
2015-06-25 02:01:27 +02:00
|
|
|
|
2016-10-19 16:20:26 +02:00
|
|
|
case 'webrtcIPAddress':
|
|
|
|
this.setWebrtcIPAddress(!!details[setting]);
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
2015-06-01 21:03:22 +02:00
|
|
|
}
|
|
|
|
}
|
2016-10-19 16:20:26 +02:00
|
|
|
};
|
|
|
|
})();
|
2015-06-01 21:03:22 +02:00
|
|
|
|
2015-08-11 21:29:14 +02:00
|
|
|
/******************************************************************************/
|
2015-06-01 21:03:22 +02:00
|
|
|
/******************************************************************************/
|
|
|
|
|
2014-11-16 14:09:28 +01:00
|
|
|
vAPI.tabs = {};
|
2014-11-15 19:15:11 +01:00
|
|
|
|
2014-11-16 14:09:28 +01:00
|
|
|
/******************************************************************************/
|
2015-01-20 00:42:58 +01:00
|
|
|
|
2015-04-05 18:03:14 +02:00
|
|
|
vAPI.isBehindTheSceneTabId = function(tabId) {
|
2015-01-20 00:42:58 +01:00
|
|
|
return tabId.toString() === '-1';
|
|
|
|
};
|
|
|
|
|
|
|
|
vAPI.noTabId = '-1';
|
|
|
|
|
|
|
|
/******************************************************************************/
|
2014-11-15 19:15:11 +01:00
|
|
|
|
2015-04-20 14:28:19 +02:00
|
|
|
var toChromiumTabId = function(tabId) {
|
|
|
|
if ( typeof tabId === 'string' ) {
|
|
|
|
tabId = parseInt(tabId, 10);
|
|
|
|
}
|
|
|
|
if ( typeof tabId !== 'number' || isNaN(tabId) || tabId === -1 ) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
return tabId;
|
|
|
|
};
|
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
|
2015-03-20 20:14:56 +01:00
|
|
|
vAPI.tabs.registerListeners = function() {
|
|
|
|
var onNavigationClient = this.onNavigation || noopFunc;
|
2015-03-27 18:00:55 +01:00
|
|
|
var onUpdatedClient = this.onUpdated || noopFunc;
|
2015-03-20 20:14:56 +01:00
|
|
|
|
|
|
|
// https://developer.chrome.com/extensions/webNavigation
|
|
|
|
// [onCreatedNavigationTarget ->]
|
|
|
|
// onBeforeNavigate ->
|
|
|
|
// onCommitted ->
|
|
|
|
// onDOMContentLoaded ->
|
|
|
|
// onCompleted
|
|
|
|
|
2015-03-22 01:30:00 +01:00
|
|
|
// The chrome.webRequest.onBeforeRequest() won't be called for everything
|
|
|
|
// else than `http`/`https`. Thus, in such case, we will bind the tab as
|
|
|
|
// early as possible in order to increase the likelihood of a context
|
|
|
|
// properly setup if network requests are fired from within the tab.
|
|
|
|
// Example: Chromium + case #6 at
|
|
|
|
// http://raymondhill.net/ublock/popup.html
|
|
|
|
var reGoodForWebRequestAPI = /^https?:\/\//;
|
|
|
|
|
2016-09-15 15:06:22 +02:00
|
|
|
// https://forums.lanik.us/viewtopic.php?f=62&t=32826
|
2016-09-15 15:09:13 +02:00
|
|
|
// Chromium-based browsers: sanitize target URL. I've seen data: URI with
|
|
|
|
// newline characters in standard fields, possibly as a way of evading
|
|
|
|
// filters. As per spec, there should be no whitespaces in a data: URI's
|
2016-09-15 15:06:22 +02:00
|
|
|
// standard fields.
|
|
|
|
var sanitizeURL = function(url) {
|
|
|
|
if ( url.startsWith('data:') === false ) { return url; }
|
|
|
|
var pos = url.indexOf(',');
|
|
|
|
if ( pos === -1 ) { return url; }
|
|
|
|
var s = url.slice(0, pos);
|
|
|
|
if ( s.search(/\s/) === -1 ) { return url; }
|
|
|
|
return s.replace(/\s+/, '') + url.slice(pos);
|
|
|
|
};
|
|
|
|
|
2015-03-20 20:14:56 +01:00
|
|
|
var onCreatedNavigationTarget = function(details) {
|
2015-03-22 01:30:00 +01:00
|
|
|
//console.debug('onCreatedNavigationTarget: popup candidate tab id %d = "%s"', details.tabId, details.url);
|
|
|
|
if ( reGoodForWebRequestAPI.test(details.url) === false ) {
|
|
|
|
details.frameId = 0;
|
2016-09-15 15:06:22 +02:00
|
|
|
details.url = sanitizeURL(details.url);
|
2015-03-22 01:30:00 +01:00
|
|
|
onNavigationClient(details);
|
|
|
|
}
|
2015-12-01 21:07:22 +01:00
|
|
|
if ( typeof vAPI.tabs.onPopupCreated === 'function' ) {
|
|
|
|
vAPI.tabs.onPopupCreated(details.tabId.toString(), details.sourceTabId.toString());
|
|
|
|
}
|
2015-03-20 20:14:56 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
var onBeforeNavigate = function(details) {
|
2015-03-22 01:30:00 +01:00
|
|
|
if ( details.frameId !== 0 ) {
|
|
|
|
return;
|
2015-03-21 04:37:43 +01:00
|
|
|
}
|
2015-03-20 20:14:56 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
var onCommitted = function(details) {
|
2015-03-22 01:30:00 +01:00
|
|
|
if ( details.frameId !== 0 ) {
|
|
|
|
return;
|
2015-03-20 20:14:56 +01:00
|
|
|
}
|
2016-09-15 15:06:22 +02:00
|
|
|
details.url = sanitizeURL(details.url);
|
2015-03-20 20:14:56 +01:00
|
|
|
onNavigationClient(details);
|
|
|
|
};
|
|
|
|
|
2016-01-17 19:30:43 +01:00
|
|
|
var onActivated = function(details) {
|
|
|
|
vAPI.contextMenu.onMustUpdate(details.tabId);
|
|
|
|
};
|
|
|
|
|
|
|
|
var onUpdated = function(tabId, changeInfo, tab) {
|
2016-09-15 15:06:22 +02:00
|
|
|
if ( changeInfo.url ) {
|
|
|
|
changeInfo.url = sanitizeURL(changeInfo.url);
|
|
|
|
}
|
2016-10-23 00:10:49 +02:00
|
|
|
onUpdatedClient(tabId.toString(), changeInfo, tab);
|
2016-01-17 19:30:43 +01:00
|
|
|
};
|
|
|
|
|
2015-03-20 20:14:56 +01:00
|
|
|
chrome.webNavigation.onBeforeNavigate.addListener(onBeforeNavigate);
|
|
|
|
chrome.webNavigation.onCommitted.addListener(onCommitted);
|
2016-10-19 16:20:26 +02:00
|
|
|
// Not supported on Firefox WebExtensions yet.
|
|
|
|
if ( chrome.webNavigation.onCreatedNavigationTarget instanceof Object ) {
|
|
|
|
chrome.webNavigation.onCreatedNavigationTarget.addListener(onCreatedNavigationTarget);
|
|
|
|
}
|
2016-01-17 19:30:43 +01:00
|
|
|
chrome.tabs.onActivated.addListener(onActivated);
|
2015-03-27 18:00:55 +01:00
|
|
|
chrome.tabs.onUpdated.addListener(onUpdated);
|
2014-11-15 19:15:11 +01:00
|
|
|
|
2014-11-16 14:09:28 +01:00
|
|
|
if ( typeof this.onClosed === 'function' ) {
|
|
|
|
chrome.tabs.onRemoved.addListener(this.onClosed);
|
|
|
|
}
|
2014-11-15 19:15:11 +01:00
|
|
|
|
2014-11-16 14:09:28 +01:00
|
|
|
};
|
2014-11-15 19:15:11 +01:00
|
|
|
|
2014-11-16 14:09:28 +01:00
|
|
|
/******************************************************************************/
|
2014-11-15 19:15:11 +01:00
|
|
|
|
2014-11-16 14:09:28 +01:00
|
|
|
vAPI.tabs.get = function(tabId, callback) {
|
2014-11-21 02:18:33 +01:00
|
|
|
var onTabReady = function(tab) {
|
|
|
|
// https://code.google.com/p/chromium/issues/detail?id=410868#c8
|
|
|
|
if ( chrome.runtime.lastError ) {
|
2015-01-21 14:59:23 +01:00
|
|
|
/* noop */
|
2014-11-21 02:18:33 +01:00
|
|
|
}
|
2015-01-02 19:42:35 +01:00
|
|
|
// Caller must be prepared to deal with nil tab value
|
2014-11-21 02:18:33 +01:00
|
|
|
callback(tab);
|
2014-11-24 15:48:33 +01:00
|
|
|
};
|
2015-04-20 14:28:19 +02:00
|
|
|
|
2014-11-16 14:09:28 +01:00
|
|
|
if ( tabId !== null ) {
|
2015-04-20 14:28:19 +02:00
|
|
|
tabId = toChromiumTabId(tabId);
|
|
|
|
if ( tabId === 0 ) {
|
2015-04-13 00:32:35 +02:00
|
|
|
onTabReady(null);
|
2015-04-13 00:56:26 +02:00
|
|
|
} else {
|
|
|
|
chrome.tabs.get(tabId, onTabReady);
|
2015-04-13 00:32:35 +02:00
|
|
|
}
|
2014-11-16 14:09:28 +01:00
|
|
|
return;
|
|
|
|
}
|
2015-04-20 14:28:19 +02:00
|
|
|
|
2014-11-16 14:09:28 +01:00
|
|
|
var onTabReceived = function(tabs) {
|
2014-11-21 02:18:33 +01:00
|
|
|
// https://code.google.com/p/chromium/issues/detail?id=410868#c8
|
2016-01-17 19:30:43 +01:00
|
|
|
void chrome.runtime.lastError;
|
2014-11-16 14:09:28 +01:00
|
|
|
callback(tabs[0]);
|
|
|
|
};
|
|
|
|
chrome.tabs.query({ active: true, currentWindow: true }, onTabReceived);
|
|
|
|
};
|
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
|
|
|
|
// properties of the details object:
|
|
|
|
// url: 'URL', // the address that will be opened
|
|
|
|
// tabId: 1, // the tab is used if set, instead of creating a new one
|
|
|
|
// index: -1, // undefined: end of the list, -1: following tab, or after index
|
|
|
|
// active: false, // opens the tab in background - true and undefined: foreground
|
2015-07-01 18:18:03 +02:00
|
|
|
// select: true, // if a tab is already opened with that url, then select it instead of opening a new one
|
|
|
|
// popup: true // open in a new window
|
2014-11-16 14:09:28 +01:00
|
|
|
|
|
|
|
vAPI.tabs.open = function(details) {
|
2014-11-16 20:04:37 +01:00
|
|
|
var targetURL = details.url;
|
|
|
|
if ( typeof targetURL !== 'string' || targetURL === '' ) {
|
2014-11-16 14:09:28 +01:00
|
|
|
return null;
|
|
|
|
}
|
2015-08-01 17:30:54 +02:00
|
|
|
|
2014-11-16 14:09:28 +01:00
|
|
|
// extension pages
|
2014-11-16 20:04:37 +01:00
|
|
|
if ( /^[\w-]{2,}:/.test(targetURL) !== true ) {
|
|
|
|
targetURL = vAPI.getURL(targetURL);
|
2014-11-16 14:09:28 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// dealing with Chrome's asynchronous API
|
|
|
|
var wrapper = function() {
|
|
|
|
if ( details.active === undefined ) {
|
|
|
|
details.active = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
var subWrapper = function() {
|
|
|
|
var _details = {
|
2014-11-16 20:04:37 +01:00
|
|
|
url: targetURL,
|
2014-11-16 14:09:28 +01:00
|
|
|
active: !!details.active
|
2014-11-15 19:15:11 +01:00
|
|
|
};
|
|
|
|
|
2015-03-12 15:07:55 +01:00
|
|
|
// Opening a tab from incognito window won't focus the window
|
|
|
|
// in which the tab was opened
|
|
|
|
var focusWindow = function(tab) {
|
|
|
|
if ( tab.active ) {
|
|
|
|
chrome.windows.update(tab.windowId, { focused: true });
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2015-03-12 14:07:16 +01:00
|
|
|
if ( !details.tabId ) {
|
2014-11-16 14:09:28 +01:00
|
|
|
if ( details.index !== undefined ) {
|
|
|
|
_details.index = details.index;
|
|
|
|
}
|
|
|
|
|
2015-03-12 15:07:55 +01:00
|
|
|
chrome.tabs.create(_details, focusWindow);
|
2015-03-12 14:07:16 +01:00
|
|
|
return;
|
2014-11-15 19:15:11 +01:00
|
|
|
}
|
|
|
|
|
2015-03-12 14:07:16 +01:00
|
|
|
// update doesn't accept index, must use move
|
2015-04-20 14:28:19 +02:00
|
|
|
chrome.tabs.update(toChromiumTabId(details.tabId), _details, function(tab) {
|
2015-03-12 14:07:16 +01:00
|
|
|
// if the tab doesn't exist
|
|
|
|
if ( vAPI.lastError() ) {
|
2015-03-12 15:07:55 +01:00
|
|
|
chrome.tabs.create(_details, focusWindow);
|
2015-03-12 14:07:16 +01:00
|
|
|
} else if ( details.index !== undefined ) {
|
|
|
|
chrome.tabs.move(tab.id, {index: details.index});
|
2014-11-15 19:15:11 +01:00
|
|
|
}
|
|
|
|
});
|
2015-03-12 14:07:16 +01:00
|
|
|
};
|
|
|
|
|
2015-07-01 18:18:03 +02:00
|
|
|
// Open in a standalone window
|
|
|
|
if ( details.popup === true ) {
|
|
|
|
chrome.windows.create({
|
|
|
|
url: details.url,
|
|
|
|
focused: details.active,
|
|
|
|
type: 'popup'
|
|
|
|
});
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2015-03-12 14:07:16 +01:00
|
|
|
if ( details.index !== -1 ) {
|
2014-11-16 14:09:28 +01:00
|
|
|
subWrapper();
|
2015-03-12 14:07:16 +01:00
|
|
|
return;
|
2014-11-15 19:15:11 +01:00
|
|
|
}
|
2014-11-16 14:09:28 +01:00
|
|
|
|
2015-03-12 14:07:16 +01:00
|
|
|
vAPI.tabs.get(null, function(tab) {
|
|
|
|
if ( tab ) {
|
|
|
|
details.index = tab.index + 1;
|
|
|
|
} else {
|
|
|
|
delete details.index;
|
2014-11-16 14:09:28 +01:00
|
|
|
}
|
2015-03-12 14:07:16 +01:00
|
|
|
|
|
|
|
subWrapper();
|
2014-11-16 14:09:28 +01:00
|
|
|
});
|
2015-03-12 14:07:16 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
if ( !details.select ) {
|
2014-11-16 14:09:28 +01:00
|
|
|
wrapper();
|
2015-03-12 14:07:16 +01:00
|
|
|
return;
|
2014-11-16 14:09:28 +01:00
|
|
|
}
|
2015-03-12 14:07:16 +01:00
|
|
|
|
2015-08-01 17:30:54 +02:00
|
|
|
// https://developer.chrome.com/extensions/tabs#method-query
|
|
|
|
// "Note that fragment identifiers are not matched."
|
|
|
|
// It's a lie, fragment identifiers ARE matched. So we need to remove the
|
|
|
|
// fragment.
|
|
|
|
var pos = targetURL.indexOf('#');
|
2015-08-03 15:25:18 +02:00
|
|
|
var targetURLWithoutHash = pos === -1 ? targetURL : targetURL.slice(0, pos);
|
2015-08-01 17:30:54 +02:00
|
|
|
|
|
|
|
chrome.tabs.query({ url: targetURLWithoutHash }, function(tabs) {
|
2015-03-12 14:28:02 +01:00
|
|
|
var tab = tabs[0];
|
2015-08-01 17:30:54 +02:00
|
|
|
if ( !tab ) {
|
2015-03-12 14:07:16 +01:00
|
|
|
wrapper();
|
2015-08-01 17:30:54 +02:00
|
|
|
return;
|
2015-03-12 14:07:16 +01:00
|
|
|
}
|
2015-08-01 17:30:54 +02:00
|
|
|
|
|
|
|
var _details = {
|
|
|
|
active: true,
|
|
|
|
url: undefined
|
|
|
|
};
|
|
|
|
if ( targetURL !== tab.url ) {
|
|
|
|
_details.url = targetURL;
|
|
|
|
}
|
|
|
|
chrome.tabs.update(tab.id, _details, function(tab) {
|
|
|
|
chrome.windows.update(tab.windowId, { focused: true });
|
|
|
|
});
|
2015-03-12 14:07:16 +01:00
|
|
|
});
|
2014-11-16 14:09:28 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
|
2015-03-27 18:00:55 +01:00
|
|
|
// Replace the URL of a tab. Noop if the tab does not exist.
|
|
|
|
|
|
|
|
vAPI.tabs.replace = function(tabId, url) {
|
2015-04-20 14:28:19 +02:00
|
|
|
tabId = toChromiumTabId(tabId);
|
|
|
|
if ( tabId === 0 ) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2015-03-27 18:00:55 +01:00
|
|
|
var targetURL = url;
|
|
|
|
|
|
|
|
// extension pages
|
|
|
|
if ( /^[\w-]{2,}:/.test(targetURL) !== true ) {
|
|
|
|
targetURL = vAPI.getURL(targetURL);
|
|
|
|
}
|
|
|
|
|
|
|
|
chrome.tabs.update(tabId, { url: targetURL }, function() {
|
2015-04-20 14:28:19 +02:00
|
|
|
// https://code.google.com/p/chromium/issues/detail?id=410868#c8
|
2015-03-27 18:00:55 +01:00
|
|
|
if ( chrome.runtime.lastError ) {
|
2015-04-20 14:28:19 +02:00
|
|
|
/* noop */
|
2015-03-27 18:00:55 +01:00
|
|
|
}
|
|
|
|
});
|
|
|
|
};
|
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
|
2014-11-16 14:09:28 +01:00
|
|
|
vAPI.tabs.remove = function(tabId) {
|
2015-04-20 14:28:19 +02:00
|
|
|
tabId = toChromiumTabId(tabId);
|
|
|
|
if ( tabId === 0 ) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2014-11-16 14:09:28 +01:00
|
|
|
var onTabRemoved = function() {
|
2015-04-20 14:28:19 +02:00
|
|
|
// https://code.google.com/p/chromium/issues/detail?id=410868#c8
|
|
|
|
if ( chrome.runtime.lastError ) {
|
|
|
|
/* noop */
|
2014-11-15 19:15:11 +01:00
|
|
|
}
|
2014-11-16 14:09:28 +01:00
|
|
|
};
|
2015-04-20 14:28:19 +02:00
|
|
|
|
|
|
|
chrome.tabs.remove(tabId, onTabRemoved);
|
2014-11-16 14:09:28 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
|
2015-01-21 14:59:23 +01:00
|
|
|
vAPI.tabs.reload = function(tabId /*, flags*/) {
|
2015-04-20 14:28:19 +02:00
|
|
|
tabId = toChromiumTabId(tabId);
|
|
|
|
if ( tabId === 0 ) {
|
|
|
|
return;
|
2015-01-06 14:01:15 +01:00
|
|
|
}
|
2015-04-20 14:28:19 +02:00
|
|
|
|
|
|
|
var onReloaded = function() {
|
|
|
|
// https://code.google.com/p/chromium/issues/detail?id=410868#c8
|
|
|
|
if ( chrome.runtime.lastError ) {
|
|
|
|
/* noop */
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
chrome.tabs.reload(tabId, onReloaded);
|
2015-01-06 14:01:15 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
|
2015-05-25 00:50:09 +02:00
|
|
|
// Select a specific tab.
|
|
|
|
|
|
|
|
vAPI.tabs.select = function(tabId) {
|
|
|
|
tabId = toChromiumTabId(tabId);
|
|
|
|
if ( tabId === 0 ) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
chrome.tabs.update(tabId, { active: true }, function(tab) {
|
|
|
|
if ( chrome.runtime.lastError ) {
|
|
|
|
/* noop */
|
|
|
|
}
|
|
|
|
if ( !tab ) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
chrome.windows.update(tab.windowId, { focused: true });
|
|
|
|
});
|
|
|
|
};
|
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
|
2014-11-16 14:09:28 +01:00
|
|
|
vAPI.tabs.injectScript = function(tabId, details, callback) {
|
2014-11-20 04:36:06 +01:00
|
|
|
var onScriptExecuted = function() {
|
2014-11-21 02:18:33 +01:00
|
|
|
// https://code.google.com/p/chromium/issues/detail?id=410868#c8
|
2014-11-20 04:36:06 +01:00
|
|
|
if ( chrome.runtime.lastError ) {
|
2015-04-20 14:28:19 +02:00
|
|
|
/* noop */
|
2014-11-20 04:36:06 +01:00
|
|
|
}
|
|
|
|
if ( typeof callback === 'function' ) {
|
|
|
|
callback();
|
|
|
|
}
|
|
|
|
};
|
2014-11-16 14:09:28 +01:00
|
|
|
if ( tabId ) {
|
2015-04-20 14:28:19 +02:00
|
|
|
chrome.tabs.executeScript(toChromiumTabId(tabId), details, onScriptExecuted);
|
2014-11-16 14:09:28 +01:00
|
|
|
} else {
|
2014-11-20 04:36:06 +01:00
|
|
|
chrome.tabs.executeScript(details, onScriptExecuted);
|
2014-11-15 19:15:11 +01:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2015-08-11 21:29:14 +02:00
|
|
|
/******************************************************************************/
|
2014-11-15 19:15:11 +01:00
|
|
|
/******************************************************************************/
|
|
|
|
|
|
|
|
// Must read: https://code.google.com/p/chromium/issues/detail?id=410868#c8
|
|
|
|
|
2015-04-07 03:26:05 +02:00
|
|
|
// https://github.com/chrisaljoudi/uBlock/issues/19
|
|
|
|
// https://github.com/chrisaljoudi/uBlock/issues/207
|
2014-11-15 19:15:11 +01:00
|
|
|
// Since we may be called asynchronously, the tab id may not exist
|
|
|
|
// anymore, so this ensures it does still exist.
|
|
|
|
|
2014-12-26 21:41:44 +01:00
|
|
|
vAPI.setIcon = function(tabId, iconStatus, badge) {
|
2015-04-20 14:28:19 +02:00
|
|
|
tabId = toChromiumTabId(tabId);
|
|
|
|
if ( tabId === 0 ) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2014-11-15 19:15:11 +01:00
|
|
|
var onIconReady = function() {
|
2014-11-16 03:21:13 +01:00
|
|
|
if ( vAPI.lastError() ) {
|
2014-11-15 19:15:11 +01:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
chrome.browserAction.setBadgeText({ tabId: tabId, text: badge });
|
|
|
|
if ( badge !== '' ) {
|
2014-12-26 21:41:44 +01:00
|
|
|
chrome.browserAction.setBadgeBackgroundColor({
|
|
|
|
tabId: tabId,
|
|
|
|
color: '#666'
|
|
|
|
});
|
2014-11-15 19:15:11 +01:00
|
|
|
}
|
|
|
|
};
|
2014-12-26 21:41:44 +01:00
|
|
|
|
|
|
|
var iconPaths = iconStatus === 'on' ?
|
|
|
|
{ '19': 'img/browsericons/icon19.png', '38': 'img/browsericons/icon38.png' } :
|
|
|
|
{ '19': 'img/browsericons/icon19-off.png', '38': 'img/browsericons/icon38-off.png' };
|
|
|
|
|
|
|
|
chrome.browserAction.setIcon({ tabId: tabId, path: iconPaths }, onIconReady);
|
2016-01-17 19:30:43 +01:00
|
|
|
vAPI.contextMenu.onMustUpdate(tabId);
|
2014-11-15 19:15:11 +01:00
|
|
|
};
|
|
|
|
|
2015-08-11 21:29:14 +02:00
|
|
|
/******************************************************************************/
|
2014-11-15 19:15:11 +01:00
|
|
|
/******************************************************************************/
|
|
|
|
|
|
|
|
vAPI.messaging = {
|
|
|
|
ports: {},
|
|
|
|
listeners: {},
|
2014-11-16 14:09:28 +01:00
|
|
|
defaultHandler: null,
|
2015-01-21 01:39:13 +01:00
|
|
|
NOOPFUNC: noopFunc,
|
2014-11-16 14:09:28 +01:00
|
|
|
UNHANDLED: 'vAPI.messaging.notHandled'
|
|
|
|
};
|
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
|
2015-06-29 16:46:20 +02:00
|
|
|
vAPI.messaging.listen = function(listenerName, callback) {
|
|
|
|
this.listeners[listenerName] = callback;
|
2015-06-26 06:08:41 +02:00
|
|
|
};
|
|
|
|
|
2015-06-29 16:46:20 +02:00
|
|
|
/******************************************************************************/
|
2015-06-26 06:08:41 +02:00
|
|
|
|
2015-06-29 16:46:20 +02:00
|
|
|
vAPI.messaging.onPortMessage = (function() {
|
|
|
|
var messaging = vAPI.messaging;
|
|
|
|
var toAuxPending = {};
|
2015-06-26 06:08:41 +02:00
|
|
|
|
2015-06-29 16:46:20 +02:00
|
|
|
// Use a wrapper to avoid closure and to allow reuse.
|
|
|
|
var CallbackWrapper = function(port, request, timeout) {
|
|
|
|
this.callback = this.proxy.bind(this); // bind once
|
|
|
|
this.init(port, request, timeout);
|
|
|
|
};
|
|
|
|
|
|
|
|
CallbackWrapper.prototype.init = function(port, request, timeout) {
|
|
|
|
this.port = port;
|
|
|
|
this.request = request;
|
|
|
|
this.timerId = timeout !== undefined ?
|
|
|
|
vAPI.setTimeout(this.callback, timeout) :
|
|
|
|
null;
|
|
|
|
return this;
|
|
|
|
};
|
|
|
|
|
|
|
|
CallbackWrapper.prototype.proxy = function(response) {
|
|
|
|
if ( this.timerId !== null ) {
|
|
|
|
clearTimeout(this.timerId);
|
|
|
|
delete toAuxPending[this.timerId];
|
|
|
|
this.timerId = null;
|
|
|
|
}
|
|
|
|
// https://github.com/chrisaljoudi/uBlock/issues/383
|
|
|
|
if ( messaging.ports.hasOwnProperty(this.port.name) ) {
|
|
|
|
this.port.postMessage({
|
|
|
|
auxProcessId: this.request.auxProcessId,
|
|
|
|
channelName: this.request.channelName,
|
|
|
|
msg: response !== undefined ? response : null
|
|
|
|
});
|
|
|
|
}
|
|
|
|
// Mark for reuse
|
|
|
|
this.port = this.request = null;
|
|
|
|
callbackWrapperJunkyard.push(this);
|
|
|
|
};
|
|
|
|
|
|
|
|
var callbackWrapperJunkyard = [];
|
2015-06-26 06:08:41 +02:00
|
|
|
|
2015-06-29 16:46:20 +02:00
|
|
|
var callbackWrapperFactory = function(port, request, timeout) {
|
|
|
|
var wrapper = callbackWrapperJunkyard.pop();
|
|
|
|
if ( wrapper ) {
|
|
|
|
return wrapper.init(port, request, timeout);
|
|
|
|
}
|
|
|
|
return new CallbackWrapper(port, request, timeout);
|
|
|
|
};
|
|
|
|
|
|
|
|
var toAux = function(details, portFrom) {
|
2015-07-06 15:07:51 +02:00
|
|
|
var port, portTo;
|
2015-06-29 16:46:20 +02:00
|
|
|
var chromiumTabId = toChromiumTabId(details.toTabId);
|
|
|
|
|
|
|
|
// TODO: This could be an issue with a lot of tabs: easy to address
|
|
|
|
// with a port name to tab id map.
|
|
|
|
for ( var portName in messaging.ports ) {
|
|
|
|
if ( messaging.ports.hasOwnProperty(portName) === false ) {
|
|
|
|
continue;
|
|
|
|
}
|
2015-07-06 15:07:51 +02:00
|
|
|
// When sending to an auxiliary process, the target is always the
|
|
|
|
// port associated with the root frame.
|
|
|
|
port = messaging.ports[portName];
|
|
|
|
if ( port.sender.frameId === 0 && port.sender.tab.id === chromiumTabId ) {
|
|
|
|
portTo = port;
|
2015-06-29 16:46:20 +02:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
var wrapper;
|
|
|
|
if ( details.auxProcessId !== undefined ) {
|
|
|
|
wrapper = callbackWrapperFactory(portFrom, details, 1023);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Destination not found:
|
|
|
|
if ( portTo === undefined ) {
|
|
|
|
if ( wrapper !== undefined ) {
|
|
|
|
wrapper.callback();
|
|
|
|
}
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
// As per HTML5, timer id is always an integer, thus suitable to be
|
|
|
|
// used as a key, and which value is safe to use across process
|
|
|
|
// boundaries.
|
|
|
|
if ( wrapper !== undefined ) {
|
|
|
|
toAuxPending[wrapper.timerId] = wrapper;
|
|
|
|
}
|
|
|
|
|
|
|
|
portTo.postMessage({
|
|
|
|
mainProcessId: wrapper && wrapper.timerId,
|
|
|
|
channelName: details.toChannel,
|
|
|
|
msg: details.msg
|
2015-06-26 06:08:41 +02:00
|
|
|
});
|
2015-06-29 16:46:20 +02:00
|
|
|
};
|
2015-06-26 06:08:41 +02:00
|
|
|
|
2015-06-29 16:46:20 +02:00
|
|
|
var toAuxResponse = function(details) {
|
|
|
|
var mainProcessId = details.mainProcessId;
|
|
|
|
if ( mainProcessId === undefined ) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if ( toAuxPending.hasOwnProperty(mainProcessId) === false ) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
var wrapper = toAuxPending[mainProcessId];
|
|
|
|
delete toAuxPending[mainProcessId];
|
|
|
|
wrapper.callback(details.msg);
|
|
|
|
};
|
2015-06-26 06:08:41 +02:00
|
|
|
|
2015-06-29 16:46:20 +02:00
|
|
|
return function(request, port) {
|
|
|
|
// Auxiliary process to auxiliary process
|
|
|
|
if ( request.toTabId !== undefined ) {
|
|
|
|
toAux(request, port);
|
|
|
|
return;
|
|
|
|
}
|
2014-11-16 14:09:28 +01:00
|
|
|
|
2015-06-29 16:46:20 +02:00
|
|
|
// Auxiliary process to auxiliary process: response
|
|
|
|
if ( request.mainProcessId !== undefined ) {
|
|
|
|
toAuxResponse(request);
|
|
|
|
return;
|
|
|
|
}
|
2014-11-16 14:09:28 +01:00
|
|
|
|
2015-06-29 16:46:20 +02:00
|
|
|
// Auxiliary process to main process: prepare response
|
|
|
|
var callback = messaging.NOOPFUNC;
|
|
|
|
if ( request.auxProcessId !== undefined ) {
|
|
|
|
callback = callbackWrapperFactory(port, request).callback;
|
|
|
|
}
|
2014-11-15 19:15:11 +01:00
|
|
|
|
2015-06-29 16:46:20 +02:00
|
|
|
// Auxiliary process to main process: specific handler
|
|
|
|
var r = messaging.UNHANDLED;
|
|
|
|
var listener = messaging.listeners[request.channelName];
|
|
|
|
if ( typeof listener === 'function' ) {
|
|
|
|
r = listener(request.msg, port.sender, callback);
|
|
|
|
}
|
|
|
|
if ( r !== messaging.UNHANDLED ) {
|
|
|
|
return;
|
|
|
|
}
|
2014-11-15 19:15:11 +01:00
|
|
|
|
2015-06-29 16:46:20 +02:00
|
|
|
// Auxiliary process to main process: default handler
|
|
|
|
r = messaging.defaultHandler(request.msg, port.sender, callback);
|
|
|
|
if ( r !== messaging.UNHANDLED ) {
|
|
|
|
return;
|
|
|
|
}
|
2014-11-15 19:15:11 +01:00
|
|
|
|
2015-06-29 16:46:20 +02:00
|
|
|
// Auxiliary process to main process: no handler
|
|
|
|
console.error('uBlock> messaging > unknown request: %o', request);
|
2014-11-18 14:35:42 +01:00
|
|
|
|
2015-06-29 16:46:20 +02:00
|
|
|
// Need to callback anyways in case caller expected an answer, or
|
|
|
|
// else there is a memory leak on caller's side
|
|
|
|
callback();
|
|
|
|
};
|
|
|
|
})();
|
2014-11-15 19:15:11 +01:00
|
|
|
|
2014-11-16 15:49:55 +01:00
|
|
|
/******************************************************************************/
|
2014-11-15 19:15:11 +01:00
|
|
|
|
2014-11-18 14:29:55 +01:00
|
|
|
vAPI.messaging.onPortDisconnect = function(port) {
|
|
|
|
port.onDisconnect.removeListener(vAPI.messaging.onPortDisconnect);
|
2014-11-16 15:49:55 +01:00
|
|
|
port.onMessage.removeListener(vAPI.messaging.onPortMessage);
|
|
|
|
delete vAPI.messaging.ports[port.name];
|
|
|
|
};
|
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
|
2014-11-18 14:29:55 +01:00
|
|
|
vAPI.messaging.onPortConnect = function(port) {
|
|
|
|
port.onDisconnect.addListener(vAPI.messaging.onPortDisconnect);
|
2014-11-16 15:49:55 +01:00
|
|
|
port.onMessage.addListener(vAPI.messaging.onPortMessage);
|
2014-11-16 14:09:28 +01:00
|
|
|
vAPI.messaging.ports[port.name] = port;
|
|
|
|
};
|
2014-11-15 19:15:11 +01:00
|
|
|
|
2014-11-16 14:09:28 +01:00
|
|
|
/******************************************************************************/
|
2014-11-15 19:15:11 +01:00
|
|
|
|
2014-11-16 14:09:28 +01:00
|
|
|
vAPI.messaging.setup = function(defaultHandler) {
|
|
|
|
// Already setup?
|
|
|
|
if ( this.defaultHandler !== null ) {
|
|
|
|
return;
|
|
|
|
}
|
2014-11-15 19:15:11 +01:00
|
|
|
|
2014-11-16 14:09:28 +01:00
|
|
|
if ( typeof defaultHandler !== 'function' ) {
|
2014-11-16 17:39:38 +01:00
|
|
|
defaultHandler = function(){ return vAPI.messaging.UNHANDLED; };
|
2014-11-16 15:49:55 +01:00
|
|
|
}
|
2014-11-16 14:09:28 +01:00
|
|
|
this.defaultHandler = defaultHandler;
|
2014-11-15 19:15:11 +01:00
|
|
|
|
2014-11-18 14:29:55 +01:00
|
|
|
chrome.runtime.onConnect.addListener(this.onPortConnect);
|
2014-11-16 14:09:28 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
|
|
|
|
vAPI.messaging.broadcast = function(message) {
|
|
|
|
var messageWrapper = {
|
|
|
|
broadcast: true,
|
|
|
|
msg: message
|
|
|
|
};
|
2014-11-15 19:15:11 +01:00
|
|
|
|
2014-11-16 14:09:28 +01:00
|
|
|
for ( var portName in this.ports ) {
|
|
|
|
if ( this.ports.hasOwnProperty(portName) === false ) {
|
|
|
|
continue;
|
2014-11-15 19:15:11 +01:00
|
|
|
}
|
2014-11-16 14:09:28 +01:00
|
|
|
this.ports[portName].postMessage(messageWrapper);
|
2014-11-15 19:15:11 +01:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2015-08-11 21:29:14 +02:00
|
|
|
/******************************************************************************/
|
2014-11-15 19:15:11 +01:00
|
|
|
/******************************************************************************/
|
2015-02-01 15:03:43 +01:00
|
|
|
|
2015-01-21 01:39:13 +01:00
|
|
|
vAPI.net = {};
|
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
|
|
|
|
vAPI.net.registerListeners = function() {
|
|
|
|
var µb = µBlock;
|
|
|
|
var µburi = µb.URI;
|
|
|
|
|
2016-03-22 15:19:41 +01:00
|
|
|
// https://bugs.chromium.org/p/chromium/issues/detail?id=410382
|
|
|
|
// Between Chromium 38-48, plug-ins' network requests were reported as
|
|
|
|
// type "other" instead of "object".
|
2016-10-14 16:06:34 +02:00
|
|
|
var is_v38_48 = /\bChrom[a-z]+\/(?:3[89]|4[0-8])\.[\d.]+\b/.test(navigator.userAgent),
|
|
|
|
is_v49_55 = /\bChrom[a-z]+\/(?:49|5[012345])\b/.test(navigator.userAgent);
|
2016-03-22 15:19:41 +01:00
|
|
|
|
2016-01-17 19:30:43 +01:00
|
|
|
// Chromium-based browsers understand only these network request types.
|
|
|
|
var validTypes = {
|
|
|
|
'main_frame': true,
|
|
|
|
'sub_frame': true,
|
|
|
|
'stylesheet': true,
|
|
|
|
'script': true,
|
|
|
|
'image': true,
|
|
|
|
'object': true,
|
|
|
|
'xmlhttprequest': true,
|
|
|
|
'other': true
|
|
|
|
};
|
|
|
|
|
|
|
|
var denormalizeTypes = function(aa) {
|
|
|
|
if ( aa.length === 0 ) {
|
|
|
|
return Object.keys(validTypes);
|
|
|
|
}
|
|
|
|
var out = [];
|
|
|
|
var i = aa.length,
|
|
|
|
type,
|
|
|
|
needOther = true;
|
|
|
|
while ( i-- ) {
|
|
|
|
type = aa[i];
|
|
|
|
if ( validTypes.hasOwnProperty(type) ) {
|
|
|
|
out.push(type);
|
|
|
|
}
|
|
|
|
if ( type === 'other' ) {
|
|
|
|
needOther = false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if ( needOther ) {
|
|
|
|
out.push('other');
|
|
|
|
}
|
|
|
|
return out;
|
|
|
|
};
|
|
|
|
|
|
|
|
var headerValue = function(headers, name) {
|
|
|
|
var i = headers.length;
|
|
|
|
while ( i-- ) {
|
|
|
|
if ( headers[i].name.toLowerCase() === name ) {
|
|
|
|
return headers[i].value.trim();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return '';
|
|
|
|
};
|
|
|
|
|
2015-01-21 01:39:13 +01:00
|
|
|
var normalizeRequestDetails = function(details) {
|
|
|
|
details.tabId = details.tabId.toString();
|
|
|
|
|
2016-03-22 15:19:41 +01:00
|
|
|
// https://github.com/gorhill/uBlock/issues/1493
|
|
|
|
// Chromium 49+ support a new request type: `ping`, which is fired as
|
|
|
|
// a result of using `navigator.sendBeacon`.
|
|
|
|
if ( details.type === 'ping' ) {
|
|
|
|
details.type = 'beacon';
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2015-01-21 15:25:12 +01:00
|
|
|
// The rest of the function code is to normalize type
|
2015-02-23 05:47:22 +01:00
|
|
|
if ( details.type !== 'other' ) {
|
2015-01-21 01:39:13 +01:00
|
|
|
return;
|
2014-11-15 19:15:11 +01:00
|
|
|
}
|
2015-02-23 05:47:22 +01:00
|
|
|
|
2016-01-22 17:13:29 +01:00
|
|
|
var path = µburi.pathFromURI(details.url);
|
|
|
|
var pos = path.indexOf('.', path.length - 6);
|
2015-02-22 15:13:08 +01:00
|
|
|
|
2015-04-07 03:26:05 +02:00
|
|
|
// https://github.com/chrisaljoudi/uBlock/issues/862
|
2015-03-07 19:30:55 +01:00
|
|
|
// If no transposition possible, transpose to `object` as per
|
2015-02-22 15:13:08 +01:00
|
|
|
// Chromium bug 410382 (see below)
|
2016-01-17 19:30:43 +01:00
|
|
|
if ( pos !== -1 ) {
|
2016-01-22 17:13:29 +01:00
|
|
|
var needle = path.slice(pos) + '.';
|
|
|
|
if ( '.eot.ttf.otf.svg.woff.woff2.'.indexOf(needle) !== -1 ) {
|
2016-01-17 19:30:43 +01:00
|
|
|
details.type = 'font';
|
|
|
|
return;
|
|
|
|
}
|
2015-02-22 15:13:08 +01:00
|
|
|
|
2016-01-22 17:13:29 +01:00
|
|
|
if ( '.mp3.mp4.webm.'.indexOf(needle) !== -1 ) {
|
2016-01-17 19:30:43 +01:00
|
|
|
details.type = 'media';
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Still need this because often behind-the-scene requests are wrongly
|
|
|
|
// categorized as 'other'
|
2016-01-22 17:13:29 +01:00
|
|
|
if ( '.ico.png.gif.jpg.jpeg.webp.'.indexOf(needle) !== -1 ) {
|
2016-01-17 19:30:43 +01:00
|
|
|
details.type = 'image';
|
|
|
|
return;
|
|
|
|
}
|
2015-01-21 01:39:13 +01:00
|
|
|
}
|
|
|
|
|
2016-01-17 19:30:43 +01:00
|
|
|
// Try to extract type from response headers if present.
|
|
|
|
if ( details.responseHeaders ) {
|
|
|
|
var contentType = headerValue(details.responseHeaders, 'content-type');
|
|
|
|
if ( contentType.startsWith('font/') ) {
|
|
|
|
details.type = 'font';
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if ( contentType.startsWith('image/') ) {
|
|
|
|
details.type = 'image';
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if ( contentType.startsWith('audio/') || contentType.startsWith('video/') ) {
|
|
|
|
details.type = 'media';
|
|
|
|
return;
|
2015-06-11 21:08:17 +02:00
|
|
|
}
|
|
|
|
}
|
2016-01-17 19:30:43 +01:00
|
|
|
|
|
|
|
// https://code.google.com/p/chromium/issues/detail?id=410382
|
2016-03-22 15:19:41 +01:00
|
|
|
if ( is_v38_48 ) {
|
|
|
|
details.type = 'object';
|
|
|
|
}
|
2015-06-11 21:08:17 +02:00
|
|
|
};
|
|
|
|
|
2016-04-20 19:57:31 +02:00
|
|
|
// https://bugs.chromium.org/p/chromium/issues/detail?id=129353
|
|
|
|
// https://github.com/gorhill/uBlock/issues/1497
|
|
|
|
// Expose websocket-based network requests to uBO's filtering engine,
|
|
|
|
// logger, etc.
|
|
|
|
// Counterpart of following block of code is found in "vapi-client.js" --
|
|
|
|
// search for "https://github.com/gorhill/uBlock/issues/1497".
|
|
|
|
var onBeforeWebsocketRequest = function(details) {
|
|
|
|
details.type = 'websocket';
|
|
|
|
var matches = /url=([^&]+)/.exec(details.url);
|
|
|
|
details.url = decodeURIComponent(matches[1]);
|
|
|
|
var r = onBeforeRequestClient(details);
|
|
|
|
// Blocked?
|
|
|
|
if ( r && r.cancel ) {
|
2016-04-20 23:24:07 +02:00
|
|
|
return r;
|
2016-04-20 19:57:31 +02:00
|
|
|
}
|
|
|
|
// Returning a 1x1 transparent pixel means "not blocked".
|
|
|
|
return { redirectUrl: 'data:image/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==' };
|
|
|
|
};
|
|
|
|
|
2015-01-21 01:39:13 +01:00
|
|
|
var onBeforeRequestClient = this.onBeforeRequest.callback;
|
|
|
|
var onBeforeRequest = function(details) {
|
2016-04-20 19:57:31 +02:00
|
|
|
// https://github.com/gorhill/uBlock/issues/1497
|
|
|
|
if (
|
|
|
|
details.type === 'image' &&
|
|
|
|
details.url.endsWith('ubofix=f41665f3028c7fd10eecf573336216d3')
|
|
|
|
) {
|
|
|
|
return onBeforeWebsocketRequest(details);
|
|
|
|
}
|
|
|
|
|
2015-01-21 01:39:13 +01:00
|
|
|
normalizeRequestDetails(details);
|
|
|
|
return onBeforeRequestClient(details);
|
|
|
|
};
|
|
|
|
|
2016-10-14 16:06:34 +02:00
|
|
|
// This is needed for Chromium 49-55.
|
|
|
|
var onBeforeSendHeaders = function(details) {
|
|
|
|
if ( details.type !== 'ping' || details.method !== 'POST' ) { return; }
|
|
|
|
var type = headerValue(details.requestHeaders, 'content-type');
|
|
|
|
if ( type === '' ) { return; }
|
|
|
|
if ( type.endsWith('/csp-report') ) {
|
|
|
|
details.type = 'csp_report';
|
|
|
|
return onBeforeRequestClient(details);
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
var onHeadersReceivedClient = this.onHeadersReceived.callback,
|
|
|
|
onHeadersReceivedClientTypes = this.onHeadersReceived.types.slice(0),
|
|
|
|
onHeadersReceivedTypes = denormalizeTypes(onHeadersReceivedClientTypes);
|
2015-01-21 01:39:13 +01:00
|
|
|
var onHeadersReceived = function(details) {
|
|
|
|
normalizeRequestDetails(details);
|
2015-06-11 21:08:17 +02:00
|
|
|
// Hack to work around Chromium API limitations, where requests of
|
|
|
|
// type `font` are returned as `other`. For example, our normalization
|
|
|
|
// fail at transposing `other` into `font` for URLs which are outside
|
|
|
|
// what is expected. At least when headers are received we can check
|
|
|
|
// for content type `font/*`. Blocking at onHeadersReceived time is
|
2015-06-11 21:18:32 +02:00
|
|
|
// less worse than not blocking at all. Also, due to Chromium bug,
|
|
|
|
// `other` always becomes `object` when it can't be normalized into
|
|
|
|
// something else. Test case for "unfriendly" font URLs:
|
2015-06-11 21:10:17 +02:00
|
|
|
// https://www.google.com/fonts
|
2016-01-17 19:30:43 +01:00
|
|
|
if ( details.type === 'font' ) {
|
|
|
|
var r = onBeforeRequestClient(details);
|
|
|
|
if ( typeof r === 'object' && r.cancel === true ) {
|
|
|
|
return { cancel: true };
|
2015-06-11 21:08:17 +02:00
|
|
|
}
|
|
|
|
}
|
2016-01-17 19:30:43 +01:00
|
|
|
if (
|
|
|
|
onHeadersReceivedClientTypes.length !== 0 &&
|
|
|
|
onHeadersReceivedClientTypes.indexOf(details.type) === -1
|
|
|
|
) {
|
|
|
|
return;
|
|
|
|
}
|
2015-01-21 01:39:13 +01:00
|
|
|
return onHeadersReceivedClient(details);
|
|
|
|
};
|
2015-09-03 16:45:36 +02:00
|
|
|
|
|
|
|
var installListeners = (function() {
|
|
|
|
var crapi = chrome.webRequest;
|
|
|
|
|
|
|
|
//listener = function(details) {
|
|
|
|
// quickProfiler.start('onBeforeRequest');
|
|
|
|
// var r = onBeforeRequest(details);
|
|
|
|
// quickProfiler.stop();
|
|
|
|
// return r;
|
|
|
|
//};
|
2016-10-14 16:06:34 +02:00
|
|
|
if ( crapi.onBeforeRequest.hasListener(onBeforeRequest) === false ) {
|
2015-09-03 16:45:36 +02:00
|
|
|
crapi.onBeforeRequest.addListener(
|
2016-10-14 16:06:34 +02:00
|
|
|
onBeforeRequest,
|
2015-09-03 16:45:36 +02:00
|
|
|
{
|
|
|
|
'urls': this.onBeforeRequest.urls || ['<all_urls>'],
|
|
|
|
'types': this.onBeforeRequest.types || undefined
|
|
|
|
},
|
|
|
|
this.onBeforeRequest.extra
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2016-10-14 16:06:34 +02:00
|
|
|
// Chromium 48 and lower does not support `ping` type.
|
|
|
|
// Chromium 56 and higher does support `csp_report` stype.
|
|
|
|
if ( is_v49_55 && crapi.onBeforeSendHeaders.hasListener(onBeforeSendHeaders) === false ) {
|
|
|
|
crapi.onBeforeSendHeaders.addListener(
|
|
|
|
onBeforeSendHeaders,
|
|
|
|
{
|
|
|
|
'urls': [ '<all_urls>' ],
|
|
|
|
'types': [ 'ping' ]
|
|
|
|
},
|
|
|
|
[ 'blocking', 'requestHeaders' ]
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
if ( crapi.onHeadersReceived.hasListener(onHeadersReceived) === false ) {
|
2015-09-03 16:45:36 +02:00
|
|
|
crapi.onHeadersReceived.addListener(
|
2016-10-14 16:06:34 +02:00
|
|
|
onHeadersReceived,
|
2015-09-03 16:45:36 +02:00
|
|
|
{
|
|
|
|
'urls': this.onHeadersReceived.urls || ['<all_urls>'],
|
|
|
|
'types': onHeadersReceivedTypes
|
|
|
|
},
|
|
|
|
this.onHeadersReceived.extra
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
// https://github.com/gorhill/uBlock/issues/675
|
|
|
|
// Experimental: keep polling to be sure our listeners are still installed.
|
|
|
|
//setTimeout(installListeners, 20000);
|
|
|
|
}).bind(this);
|
|
|
|
|
|
|
|
installListeners();
|
2014-11-15 19:15:11 +01:00
|
|
|
};
|
|
|
|
|
2015-08-11 21:29:14 +02:00
|
|
|
/******************************************************************************/
|
2014-11-15 19:15:11 +01:00
|
|
|
/******************************************************************************/
|
|
|
|
|
|
|
|
vAPI.contextMenu = {
|
2016-01-17 19:30:43 +01:00
|
|
|
_callback: null,
|
|
|
|
_entries: [],
|
|
|
|
_createEntry: function(entry) {
|
|
|
|
chrome.contextMenus.create(JSON.parse(JSON.stringify(entry)), function() {
|
|
|
|
void chrome.runtime.lastError;
|
|
|
|
});
|
2014-11-15 19:15:11 +01:00
|
|
|
},
|
2016-01-17 19:30:43 +01:00
|
|
|
onMustUpdate: function() {},
|
|
|
|
setEntries: function(entries, callback) {
|
|
|
|
entries = entries || [];
|
|
|
|
var n = Math.max(this._entries.length, entries.length),
|
|
|
|
oldEntryId, newEntry;
|
|
|
|
for ( var i = 0; i < n; i++ ) {
|
|
|
|
oldEntryId = this._entries[i];
|
|
|
|
newEntry = entries[i];
|
|
|
|
if ( oldEntryId && newEntry ) {
|
|
|
|
if ( newEntry.id !== oldEntryId ) {
|
|
|
|
chrome.contextMenus.remove(oldEntryId);
|
|
|
|
this._createEntry(newEntry);
|
|
|
|
this._entries[i] = newEntry.id;
|
|
|
|
}
|
|
|
|
} else if ( oldEntryId && !newEntry ) {
|
|
|
|
chrome.contextMenus.remove(oldEntryId);
|
|
|
|
} else if ( !oldEntryId && newEntry ) {
|
|
|
|
this._createEntry(newEntry);
|
|
|
|
this._entries[i] = newEntry.id;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
n = this._entries.length = entries.length;
|
|
|
|
callback = callback || null;
|
|
|
|
if ( callback === this._callback ) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if ( n !== 0 && callback !== null ) {
|
|
|
|
chrome.contextMenus.onClicked.addListener(callback);
|
|
|
|
this._callback = callback;
|
|
|
|
} else if ( n === 0 && this._callback !== null ) {
|
|
|
|
chrome.contextMenus.onClicked.removeListener(this._callback);
|
|
|
|
this._callback = null;
|
|
|
|
}
|
2014-11-15 19:15:11 +01:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2015-08-11 21:29:14 +02:00
|
|
|
/******************************************************************************/
|
2014-11-15 19:15:11 +01:00
|
|
|
/******************************************************************************/
|
|
|
|
|
|
|
|
vAPI.lastError = function() {
|
|
|
|
return chrome.runtime.lastError;
|
|
|
|
};
|
|
|
|
|
2015-08-11 21:29:14 +02:00
|
|
|
/******************************************************************************/
|
2014-11-15 19:15:11 +01:00
|
|
|
/******************************************************************************/
|
|
|
|
|
2014-12-17 14:02:37 +01:00
|
|
|
// This is called only once, when everything has been loaded in memory after
|
|
|
|
// the extension was launched. It can be used to inject content scripts
|
|
|
|
// in already opened web pages, to remove whatever nuisance could make it to
|
|
|
|
// the web pages before uBlock was ready.
|
|
|
|
|
|
|
|
vAPI.onLoadAllCompleted = function() {
|
|
|
|
// http://code.google.com/p/chromium/issues/detail?id=410868#c11
|
|
|
|
// Need to be sure to access `vAPI.lastError()` to prevent
|
|
|
|
// spurious warnings in the console.
|
|
|
|
var scriptDone = function() {
|
|
|
|
vAPI.lastError();
|
|
|
|
};
|
|
|
|
var scriptStart = function(tabId) {
|
|
|
|
vAPI.tabs.injectScript(tabId, {
|
|
|
|
file: 'js/vapi-client.js',
|
|
|
|
allFrames: true,
|
2015-05-16 22:33:47 +02:00
|
|
|
runAt: 'document_idle'
|
2014-12-17 14:02:37 +01:00
|
|
|
}, function(){ });
|
|
|
|
vAPI.tabs.injectScript(tabId, {
|
2016-06-28 01:09:04 +02:00
|
|
|
file: 'js/contentscript.js',
|
2014-12-17 14:02:37 +01:00
|
|
|
allFrames: true,
|
2015-05-16 22:33:47 +02:00
|
|
|
runAt: 'document_idle'
|
2016-06-28 01:09:04 +02:00
|
|
|
}, scriptDone);
|
2014-12-17 14:02:37 +01:00
|
|
|
};
|
|
|
|
var bindToTabs = function(tabs) {
|
|
|
|
var µb = µBlock;
|
|
|
|
var i = tabs.length, tab;
|
|
|
|
while ( i-- ) {
|
|
|
|
tab = tabs[i];
|
2015-04-09 00:46:08 +02:00
|
|
|
µb.tabContextManager.commit(tab.id, tab.url);
|
|
|
|
µb.bindTabToPageStats(tab.id);
|
2015-04-07 03:26:05 +02:00
|
|
|
// https://github.com/chrisaljoudi/uBlock/issues/129
|
2014-12-17 14:02:37 +01:00
|
|
|
scriptStart(tab.id);
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2015-05-02 06:13:19 +02:00
|
|
|
chrome.tabs.query({ url: '<all_urls>' }, bindToTabs);
|
2014-12-17 14:02:37 +01:00
|
|
|
};
|
|
|
|
|
2015-08-11 21:29:14 +02:00
|
|
|
/******************************************************************************/
|
2014-12-17 14:02:37 +01:00
|
|
|
/******************************************************************************/
|
|
|
|
|
2015-01-14 23:45:55 +01:00
|
|
|
vAPI.punycodeHostname = function(hostname) {
|
|
|
|
return hostname;
|
|
|
|
};
|
|
|
|
|
|
|
|
vAPI.punycodeURL = function(url) {
|
|
|
|
return url;
|
|
|
|
};
|
|
|
|
|
2015-08-11 21:29:14 +02:00
|
|
|
/******************************************************************************/
|
|
|
|
/******************************************************************************/
|
|
|
|
|
2015-10-21 19:30:04 +02:00
|
|
|
// https://github.com/gorhill/uBlock/issues/531
|
|
|
|
// Storage area dedicated to admin settings. Read-only.
|
|
|
|
|
2015-10-24 15:20:39 +02:00
|
|
|
// https://github.com/gorhill/uBlock/commit/43a5ed735b95a575a9339b6e71a1fcb27a99663b#commitcomment-13965030
|
|
|
|
// Not all Chromium-based browsers support managed storage. Merely testing or
|
2015-10-24 15:37:43 +02:00
|
|
|
// exception handling in this case does NOT work: I don't know why. The
|
|
|
|
// extension on Opera ends up in a non-sensical state, whereas vAPI become
|
|
|
|
// undefined out of nowhere. So only solution left is to test explicitly for
|
|
|
|
// Opera.
|
2015-11-03 13:44:18 +01:00
|
|
|
// https://github.com/gorhill/uBlock/issues/900
|
|
|
|
// Also, UC Browser: http://www.upsieutoc.com/image/WXuH
|
2015-10-24 15:20:39 +02:00
|
|
|
|
2015-10-21 19:30:04 +02:00
|
|
|
vAPI.adminStorage = {
|
2015-11-03 14:46:21 +01:00
|
|
|
getItem: function(key, callback) {
|
|
|
|
var onRead = function(store) {
|
|
|
|
var data;
|
|
|
|
if (
|
|
|
|
!chrome.runtime.lastError &&
|
|
|
|
typeof store === 'object' &&
|
|
|
|
store !== null
|
|
|
|
) {
|
|
|
|
data = store[key];
|
2015-10-24 15:20:39 +02:00
|
|
|
}
|
2015-11-03 14:46:21 +01:00
|
|
|
callback(data);
|
2015-10-24 15:20:39 +02:00
|
|
|
};
|
2015-11-03 14:46:21 +01:00
|
|
|
try {
|
|
|
|
chrome.storage.managed.get(key, onRead);
|
|
|
|
} catch (ex) {
|
|
|
|
callback();
|
|
|
|
}
|
|
|
|
}
|
2015-10-21 19:30:04 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
/******************************************************************************/
|
|
|
|
|
2015-08-11 21:29:14 +02:00
|
|
|
vAPI.cloud = (function() {
|
2016-10-19 16:20:26 +02:00
|
|
|
// Not all platforms support `chrome.storage.sync`.
|
|
|
|
if ( chrome.storage.sync instanceof Object === false ) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2015-08-11 21:29:14 +02:00
|
|
|
var chunkCountPerFetch = 16; // Must be a power of 2
|
|
|
|
|
|
|
|
// Mind chrome.storage.sync.MAX_ITEMS (512 at time of writing)
|
|
|
|
var maxChunkCountPerItem = Math.floor(512 * 0.75) & ~(chunkCountPerFetch - 1);
|
|
|
|
|
|
|
|
// Mind chrome.storage.sync.QUOTA_BYTES_PER_ITEM (8192 at time of writing)
|
|
|
|
var maxChunkSize = Math.floor(chrome.storage.sync.QUOTA_BYTES_PER_ITEM * 0.75);
|
|
|
|
|
2015-10-03 15:46:45 +02:00
|
|
|
// Mind chrome.storage.sync.QUOTA_BYTES (128 kB at time of writing)
|
2015-08-11 21:29:14 +02:00
|
|
|
var maxStorageSize = chrome.storage.sync.QUOTA_BYTES;
|
|
|
|
|
|
|
|
var options = {
|
2015-08-12 00:48:52 +02:00
|
|
|
defaultDeviceName: window.navigator.platform,
|
|
|
|
deviceName: window.localStorage.getItem('deviceName') || ''
|
2015-08-11 21:29:14 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
// This is used to find out a rough count of how many chunks exists:
|
|
|
|
// We "poll" at specific index in order to get a rough idea of how
|
|
|
|
// large is the stored string.
|
|
|
|
// This allows reading a single item with only 2 sync operations -- a
|
2015-10-03 15:46:45 +02:00
|
|
|
// good thing given chrome.storage.sync.MAX_WRITE_OPERATIONS_PER_MINUTE
|
|
|
|
// and chrome.storage.sync.MAX_WRITE_OPERATIONS_PER_HOUR.
|
2015-08-12 00:48:52 +02:00
|
|
|
|
2015-08-11 21:29:14 +02:00
|
|
|
var getCoarseChunkCount = function(dataKey, callback) {
|
|
|
|
var bin = {};
|
|
|
|
for ( var i = 0; i < maxChunkCountPerItem; i += 16 ) {
|
|
|
|
bin[dataKey + i.toString()] = '';
|
|
|
|
}
|
|
|
|
|
|
|
|
chrome.storage.sync.get(bin, function(bin) {
|
|
|
|
if ( chrome.runtime.lastError ) {
|
|
|
|
callback(0, chrome.runtime.lastError.message);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
var chunkCount = 0;
|
|
|
|
for ( var i = 0; i < maxChunkCountPerItem; i += 16 ) {
|
|
|
|
if ( bin[dataKey + i.toString()] === '' ) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
chunkCount = i + 16;
|
|
|
|
}
|
|
|
|
|
|
|
|
callback(chunkCount);
|
|
|
|
});
|
|
|
|
};
|
|
|
|
|
|
|
|
var deleteChunks = function(dataKey, start) {
|
|
|
|
var keys = [];
|
|
|
|
|
|
|
|
// No point in deleting more than:
|
|
|
|
// - The max number of chunks per item
|
|
|
|
// - The max number of chunks per storage limit
|
|
|
|
var n = Math.min(
|
|
|
|
maxChunkCountPerItem,
|
|
|
|
Math.ceil(maxStorageSize / maxChunkSize)
|
|
|
|
);
|
|
|
|
for ( var i = start; i < n; i++ ) {
|
|
|
|
keys.push(dataKey + i.toString());
|
|
|
|
}
|
|
|
|
chrome.storage.sync.remove(keys);
|
|
|
|
};
|
|
|
|
|
|
|
|
var start = function(/* dataKeys */) {
|
|
|
|
};
|
|
|
|
|
|
|
|
var push = function(dataKey, data, callback) {
|
2015-08-16 14:17:01 +02:00
|
|
|
var bin = {
|
2015-08-12 00:48:52 +02:00
|
|
|
'source': options.deviceName || options.defaultDeviceName,
|
2015-08-11 21:29:14 +02:00
|
|
|
'tstamp': Date.now(),
|
2015-08-16 14:17:01 +02:00
|
|
|
'data': data,
|
|
|
|
'size': 0
|
|
|
|
};
|
|
|
|
bin.size = JSON.stringify(bin).length;
|
|
|
|
var item = JSON.stringify(bin);
|
2015-08-11 21:29:14 +02:00
|
|
|
|
2015-10-03 15:46:45 +02:00
|
|
|
// Chunkify taking into account QUOTA_BYTES_PER_ITEM:
|
2015-08-11 21:29:14 +02:00
|
|
|
// https://developer.chrome.com/extensions/storage#property-sync
|
|
|
|
// "The maximum size (in bytes) of each individual item in sync
|
|
|
|
// "storage, as measured by the JSON stringification of its value
|
|
|
|
// "plus its key length."
|
2015-08-16 14:17:01 +02:00
|
|
|
bin = {};
|
2015-08-11 21:29:14 +02:00
|
|
|
var chunkCount = Math.ceil(item.length / maxChunkSize);
|
|
|
|
for ( var i = 0; i < chunkCount; i++ ) {
|
|
|
|
bin[dataKey + i.toString()] = item.substr(i * maxChunkSize, maxChunkSize);
|
|
|
|
}
|
|
|
|
bin[dataKey + i.toString()] = ''; // Sentinel
|
|
|
|
|
|
|
|
chrome.storage.sync.set(bin, function() {
|
|
|
|
var errorStr;
|
|
|
|
if ( chrome.runtime.lastError ) {
|
|
|
|
errorStr = chrome.runtime.lastError.message;
|
|
|
|
}
|
|
|
|
callback(errorStr);
|
|
|
|
|
|
|
|
// Remove potentially unused trailing chunks
|
|
|
|
deleteChunks(dataKey, chunkCount);
|
|
|
|
});
|
|
|
|
};
|
|
|
|
|
|
|
|
var pull = function(dataKey, callback) {
|
|
|
|
var assembleChunks = function(bin) {
|
|
|
|
if ( chrome.runtime.lastError ) {
|
|
|
|
callback(null, chrome.runtime.lastError.message);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Assemble chunks into a single string.
|
|
|
|
var json = [], jsonSlice;
|
|
|
|
var i = 0;
|
|
|
|
for (;;) {
|
|
|
|
jsonSlice = bin[dataKey + i.toString()];
|
|
|
|
if ( jsonSlice === '' ) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
json.push(jsonSlice);
|
|
|
|
i += 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
var entry = null;
|
|
|
|
try {
|
|
|
|
entry = JSON.parse(json.join(''));
|
|
|
|
} catch(ex) {
|
|
|
|
}
|
|
|
|
callback(entry);
|
|
|
|
};
|
|
|
|
|
|
|
|
var fetchChunks = function(coarseCount, errorStr) {
|
|
|
|
if ( coarseCount === 0 || typeof errorStr === 'string' ) {
|
|
|
|
callback(null, errorStr);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
var bin = {};
|
|
|
|
for ( var i = 0; i < coarseCount; i++ ) {
|
|
|
|
bin[dataKey + i.toString()] = '';
|
|
|
|
}
|
|
|
|
|
|
|
|
chrome.storage.sync.get(bin, assembleChunks);
|
|
|
|
};
|
|
|
|
|
|
|
|
getCoarseChunkCount(dataKey, fetchChunks);
|
|
|
|
};
|
|
|
|
|
|
|
|
var getOptions = function(callback) {
|
|
|
|
if ( typeof callback !== 'function' ) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
callback(options);
|
|
|
|
};
|
|
|
|
|
|
|
|
var setOptions = function(details, callback) {
|
|
|
|
if ( typeof details !== 'object' || details === null ) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if ( typeof details.deviceName === 'string' ) {
|
|
|
|
window.localStorage.setItem('deviceName', details.deviceName);
|
2015-08-12 00:48:52 +02:00
|
|
|
options.deviceName = details.deviceName;
|
2015-08-11 21:29:14 +02:00
|
|
|
}
|
|
|
|
|
2015-08-12 00:48:52 +02:00
|
|
|
getOptions(callback);
|
2015-08-11 21:29:14 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
return {
|
|
|
|
start: start,
|
|
|
|
push: push,
|
|
|
|
pull: pull,
|
|
|
|
getOptions: getOptions,
|
|
|
|
setOptions: setOptions
|
|
|
|
};
|
|
|
|
})();
|
|
|
|
|
|
|
|
/******************************************************************************/
|
2015-01-14 23:45:55 +01:00
|
|
|
/******************************************************************************/
|
|
|
|
|
2014-11-15 19:15:11 +01:00
|
|
|
})();
|
|
|
|
|
|
|
|
/******************************************************************************/
|